Cyber-Attackers Are Adjusting to the Security Adjustments You’ve Made Sometimes it feels terrible to be right. In our recent Global Application & Network Security Report we predicted an increase… Ben Desjardins | February 16, 2016
Best Practices for Hybrid Cloud/On-Premise Attack Mitigation The cybersecurity industry keeps us all on our toes trying to follow up with solutions and breakthrough technologies – not… Ben Zilberman | February 1, 2016
Is the Public Cloud the Ultimate Cyber-Attack Tool? On January 2nd 2016, the BBC suffered from a cyber-attack that targeted all of its applications. This attack resulted in… Yotam Ben-Ezra | January 21, 2016
Is Your Organization Prepared for Cyber Attacks? The 2015-2016 Global Application & Network Security Report Few organizations are well prepared when it comes to cyber-attacks. Blending statistical research and front-line experience, and with more than… Shira Sagiv | January 19, 2016
Cyber Security Predictions for 2016 It’s fun to predict what may happen over a year in security. The industry moves so fast and while some… Ron Winward | January 14, 2016
Ways to Protect Against Modern Day Spear Phishing Anyone who works in the cyber-security field knows that phishing attacks – especially those against large enterprises – are on… Snir Karat | January 13, 2016
The Top 5 DDoS Attack Types We Saw in 2015 There were no “common” DDoS attacks in 2015. The ones studied by Radware researchers were often volumetric; however, sophisticated, combined… Snir Karat | January 7, 2016
Your Favorite Posts of 2015 Over the past twelve months, our team of authors has offered advice, expertise, and analysis on a variety of topics… Radware | December 30, 2015
Turkey DNS Servers Under Attack Since Monday December 14th, Turkey’s DNS servers, ns1.nic.tr – ns5.nic.tr, have been the target of a persistent denial of service… Daniel Smith | December 22, 2015
Climbing the security and personal mountain in 2016 For my last blog in 2015 I’d like to address a very personal topic that has a lot in common… Werner Thalmeier | December 21, 2015
Security Messaging Can Speed Up Your Fight Against Cyber-Attacks Cyber-attacks are no longer stories for technical journals – they are now front page news. These attacks are being carried… Prakash Sinha | December 15, 2015
SSL Breaks Bad: A Protective Technology Turned Attack Vector It’s an unfortunate reality that things meant to do good can and do get misused for harm. Consider the myriad… Ben Desjardins | December 10, 2015